Cybersecurity threats are constant. This carefully selected new book provides the perspective of a cybersecurity expert, covering everything from the psychology of cyber attackers to practical defense strategies.
Understand how cyber attackers think
Written by Sarah Armstrong Smith
Armstrong-Smith is Microsoft’s chief security advisor and a sought-after speaker. In this book, she bridges the gap between technology and psychology by focusing on the human aspects of cybersecurity, including the types of attackers, their motivations and methods. The author draws on interviews with ex-offenders, advice from top experts, and extensive case studies to demonstrate why the human element in cybersecurity is more important than ever.
The AI revolution in networking, cybersecurity, and emerging technologies
Written by Omar Santos, Summer Salam, Hazim Dashiru
Artificial intelligence is impacting every aspect of business, and cybersecurity is no exception. The authors, all Cisco executives, outline how to do it. AI helps identify Addresses network security threats and explains both their theory and applications. They provide a comprehensive guide to protecting against potential security and privacy pitfalls, security monitoring and alerting, and modernizing and strengthening operations.
hacking and security
Michael Kofler, Klaus Gebeshuber, Frank Neugeberger and others
A team of German experts will explain essential security technologies for various infrastructures, including Linux, Microsoft, mobile, cloud, and the Internet of Things. This book describes identifying system vulnerabilities and possible attack vectors, and provides step-by-step instructions for resisting security attacks.
Practical cybersecurity
Written by Nicholas Marsh
Marsh focuses on practical strategies and real-world examples, drawing on experience with small, medium, and large enterprises across multiple industries. This book covers practices, policies, and products that help strengthen network security and reduce risk, and explains both the “why” and “how” of over 250 cybersecurity best practices.
Myths and misconceptions about cybersecurity
Written by Eugene Spafford, Lee Metcalf, Josiah Dykstra
Three leading cybersecurity experts go beyond common tactics and demystify the fallacies and incorrect assumptions that can undermine your security efforts. This book includes tips for recognizing and avoiding 175 common misconceptions shared by users, leaders, and cybersecurity professionals.
Cybersecurity all-in-one for beginners
Written by Joseph Steinberg, Kevin Bieber, Ira Winkler, Ted Coombs
Steinberg, a top global cybersecurity influencer, has published “Grasping Cybersecurity Basics”, “Enhancing Personal Cybersecurity”, “Safeguarding a Business”, “Securing the Cloud”, “Testing Your Security”, The six books “For Dummies” are combined into one volume. “Increasing Cybersecurity Awareness” The result is a one-stop reference for making smart security decisions.
Firewalls Don’t Stop the Dragon, 5th Edition
Written by Carrie Parker
Parker writes for the average person, using minimal jargon, and suggests simple and effective precautions everyone should take in the virtual world. This book provides easy-to-understand explanations with expert tips, step-by-step instructions, and screenshot checklists in each chapter.
Managing risk in digital transformation
Written by Ashish Kumar, Shashank Kumar, Abbas Kudrati
Real-world examples, case studies, and eye-opening statistics highlight the digital threats that can impact your company’s reputation and bottom line. focus on new risksThis book provides tips for navigating the ever-evolving risk and compliance landscape. Provides business owners, technology leaders, and cybersecurity professionals with a roadmap for the risk mitigation process.
hacked
Written by Jessica Barker
Mr Barker, the UK government’s top cybersecurity adviser, explains the tactics and technologies used by hackers and explains the common sense advice to protect yourself and your business in a world where anyone can become a victim of a cyber attack. We will propose a solution. This book includes: Explanation by experts Real-world attack stories show you how to protect yourself and respond if you’re targeted.